2 resultados para bare public-key model


Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the number of high profile cases of institutional child abuse mounts internationally, and the demands of victims for justice are heard, state responses have ranged from prosecution, apology, and compensation schemes, to truth commissions or public inquiries. Drawing on the examples of Australia and Northern Ireland as two jurisdictions with a recent and ongoing history of statutory inquiries into institutional child abuse, the article utilises the restorative justice paradigm to critically evaluate the strengths and limitations of the inquiry framework in providing ‘justice’ for victims. It critically explores the normative and pragmatic implications of a hybrid model as a more effective route to procedural justice and suggests that an appropriately designed restorative pathway may augment the legitimacy and utility of the public inquiry model for victims chiefly via improving offender accountability and ‘voice’ for victims. The article concludes by offering some thoughts on the broader implications for other jurisdictions in responding to large-scale historical abuses and seeking to come to terms with the legacy of institutional child abuse.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As the development of a viable quantum computer nears, existing widely used public-key cryptosystems, such as RSA, will no longer be secure. Thus, significant effort is being invested into post-quantum cryptography (PQC). Lattice-based cryptography (LBC) is one such promising area of PQC, which offers versatile, efficient, and high performance security services. However, the vulnerabilities of these implementations against side-channel attacks (SCA) remain significantly understudied. Most, if not all, lattice-based cryptosystems require noise samples generated from a discrete Gaussian distribution, and a successful timing analysis attack can render the whole cryptosystem broken, making the discrete Gaussian sampler the most vulnerable module to SCA. This research proposes countermeasures against timing information leakage with FPGA-based designs of the CDT-based discrete Gaussian samplers with constant response time, targeting encryption and signature scheme parameters. The proposed designs are compared against the state-of-the-art and are shown to significantly outperform existing implementations. For encryption, the proposed sampler is 9x faster in comparison to the only other existing time-independent CDT sampler design. For signatures, the first time-independent CDT sampler in hardware is proposed.